IEEE/ACM Transactions on Networking最新文献

筛选
英文 中文
OBMA: Scalable Route Lookups With Fast and Zero-Interrupt Updates 具有快速和零中断更新的可扩展路由查找
IF 3 3区 计算机科学
IEEE/ACM Transactions on Networking Pub Date : 2024-10-11 DOI: 10.1109/TNET.2024.3446689
Chuwen Zhang;Yong Feng;Haoyu Song;Ying Wan;Wenquan Xu;Bin Liu
{"title":"OBMA: Scalable Route Lookups With Fast and Zero-Interrupt Updates","authors":"Chuwen Zhang;Yong Feng;Haoyu Song;Ying Wan;Wenquan Xu;Bin Liu","doi":"10.1109/TNET.2024.3446689","DOIUrl":"https://doi.org/10.1109/TNET.2024.3446689","url":null,"abstract":"Software-based IP route lookup is a key component for packet forwarding in Software Defined Networks. Running lookup algorithms on commodity CPUs is flexible and scalable, which shows advantages on cost and power consumption over the hardware-based forwarding engines. However, dynamic network functions and services make route updates more frequent than ever. Existing algorithms often fall short of the incremental update requirements. In this paper, we propose the Overlay BitMap Algorithm (OBMA), which contains several variations, to support extraordinary update performance while maintaining the highest-in-class lookup speed and storage efficiency. Starting from the basic OBMA_B, we develop two variations with different tradeoffs for different application scenarios. OBMA_L supports faster lookups than OBMA_B at a small cost of update speed. OBMA_S achieves better storage efficiency than OBMA_B at a small cost of lookup throughput. We run our algorithms on a commodity CPU and evaluate them with real-world route tables and traces. The experiments show that OBMA achieves the lowest memory footprint, the highest update speed, and over 200 Mpps lookup throughput. Specifically, OBMA_S reduces the memory footprint to 3.98 bytes/prefix which is 25.33% smaller that of the state-of-the-art Poptrie; OBMA_L supports 252.02 Mpps lookup throughput with a single thread, and more than 600 Mpps with multiple parallel threads in a single CPU, significantly outperforming the state-of-the-art Poptrie and SAIL; OBMA_B supports updates at a rate of 14.58M updates/s which is 15 times faster than Poptrie. The tests show that the update process has little interference with the lookup process for OBMA, and achieves zero-interrupt to lookups with multiple threads.","PeriodicalId":13443,"journal":{"name":"IEEE/ACM Transactions on Networking","volume":"32 6","pages":"4842-4854"},"PeriodicalIF":3.0,"publicationDate":"2024-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142858920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mobile IP Geolocation Based on District Anchor Without Cooperation of Users or Internet Service Providers 基于区域锚的移动IP地理定位,无需用户或互联网服务提供商的合作
IF 3 3区 计算机科学
IEEE/ACM Transactions on Networking Pub Date : 2024-10-11 DOI: 10.1109/TNET.2024.3471335
Ruixiang Li;Xiaoyun Yuan;Meijuan Yin;Xiangyang Luo
{"title":"Mobile IP Geolocation Based on District Anchor Without Cooperation of Users or Internet Service Providers","authors":"Ruixiang Li;Xiaoyun Yuan;Meijuan Yin;Xiangyang Luo","doi":"10.1109/TNET.2024.3471335","DOIUrl":"https://doi.org/10.1109/TNET.2024.3471335","url":null,"abstract":"Mobile IP geolocation aims to obtain a mobile device’s geographic location by IP. This technology is widely used in preventing financial risk, investigating cybercrime, and delivering targeted information. Currently, there are three types of IP geolocation: based on cooperation, querying in database, or network measurement. However, since restricted cooperation, low-reliability databases, and unresponsive mobile IPs, existing technologies are hard to geolocate fine-grained location of mobile IP. In this paper, we propose the concept of district anchor, and propose a non-cooperative mobile IP geolocation scheme, including three parts: acquiring district anchors by clustering, evaluating the reliability of district anchors, and geolocating mobile IPs. We also give implemented approach of this scheme. Instead of using existing clustering algorithms treating IPs and geolocations in no particular order, we propose two-stages clustering algorithm (IPG2C) to acquire district anchors, and establish reliability evaluation mechanism by IP distribution and spatial distribution of cluster. Eventually, using obtained reliable district anchors, we use “subnet geolocation” strategy to geolocate mobile IPs. The experimental results in 10 cities show that: 1) our scheme can be used to geolocate mobile IPs without cooperation; 2) the mean geolocation error is 12.47km, where precision of 56.67% of mobile IPs is street-level and minimum error is only 13m; 3) that the mean geolocation error of the anchor-based method is smaller than that of the landmark-based method; 4) compared with 13 clustering algorithms (e.g., K-Means++, Mean Shift, DBSCAN, and GMM), mean geolocation error using IPG2C’s district anchors is reduced by 26.62%~50.77%.","PeriodicalId":13443,"journal":{"name":"IEEE/ACM Transactions on Networking","volume":"32 6","pages":"5507-5523"},"PeriodicalIF":3.0,"publicationDate":"2024-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142858965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fluid-Shuttle: Efficient Cloud Data Transmission Based on Serverless Computing Compression 流体穿梭:基于无服务器计算压缩的高效云数据传输
IF 3 3区 计算机科学
IEEE/ACM Transactions on Networking Pub Date : 2024-10-10 DOI: 10.1109/TNET.2024.3402561
Rong Gu;Shulin Wang;Haipeng Dai;Xiaofei Chen;Zhaokang Wang;Wenjie Bao;Jiaqi Zheng;Yaofeng Tu;Yihua Huang;Lianyong Qi;Xiaolong Xu;Wanchun Dou;Guihai Chen
{"title":"Fluid-Shuttle: Efficient Cloud Data Transmission Based on Serverless Computing Compression","authors":"Rong Gu;Shulin Wang;Haipeng Dai;Xiaofei Chen;Zhaokang Wang;Wenjie Bao;Jiaqi Zheng;Yaofeng Tu;Yihua Huang;Lianyong Qi;Xiaolong Xu;Wanchun Dou;Guihai Chen","doi":"10.1109/TNET.2024.3402561","DOIUrl":"https://doi.org/10.1109/TNET.2024.3402561","url":null,"abstract":"Nowadays, there exists a lot of cross-region data transmission demand on the cloud. It is promising to use serverless computing for data compressing to save the total data size. However, it is challenging to estimate the data transmission time and monetary cost with serverless compression. In addition, minimizing the data transmission cost is non-trivial due to the enormous parameter space. This paper focuses on this problem and makes the following contributions: 1) We propose empirical data transmission time and monetary cost models based on serverless compression. It can also predict compression information, e.g., ratio and speed using chunk sampling and machine learning techniques. 2) For single-task cloud data transmission, we propose two efficient parameter search methods based on Sequential Quadratic Programming (SQP) and Eliminate then Divide and Conquer (EDC) with proven error upper bounds. Besides, we propose a parameter fine-tuning strategy to deal with transmission bandwidth variance. 3) Furthermore, for multi-task scenarios, a parameter search method based on dynamic programming and numerical computation is proposed. We have implemented the system called Fluid-Shuttle, which includes straggler optimization, cache optimization, and the autoscaling decompression mechanism. Finally, we evaluate the performance of Fluid-Shuttle with various workloads and applications on the real-world AWS serverless computing platform. Experimental results show that the proposed approach can improve the parameter search efficiency by over \u0000<inline-formula> <tex-math>$3times $ </tex-math></inline-formula>\u0000 compared with the state-of-art methods and achieves better parameter quality. In addition, our approach achieves higher time efficiency and lower monetary cost compared with competing cloud data transmission approaches.","PeriodicalId":13443,"journal":{"name":"IEEE/ACM Transactions on Networking","volume":"32 6","pages":"4554-4569"},"PeriodicalIF":3.0,"publicationDate":"2024-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142859215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
eMPTCP: A Framework to Fully Extend Multipath TCP eMPTCP:一个完全扩展多路径TCP的框架
IF 3 3区 计算机科学
IEEE/ACM Transactions on Networking Pub Date : 2024-10-07 DOI: 10.1109/TNET.2024.3469396
Dian Shen;Bin Yang;Junxue Zhang;Fang Dong;John C. S. Lui
{"title":"eMPTCP: A Framework to Fully Extend Multipath TCP","authors":"Dian Shen;Bin Yang;Junxue Zhang;Fang Dong;John C. S. Lui","doi":"10.1109/TNET.2024.3469396","DOIUrl":"https://doi.org/10.1109/TNET.2024.3469396","url":null,"abstract":"MPTCP provides the basic multipath support for network applications to deliver high throughput and robust communication. However, the original MPTCP is designed with limited extensibility. Various research works have tried to extend MPTCP to attain better performance or richer functionalities. These existing approaches either modify the kernel implementation of MPTCP, which involve considerable engineering efforts and may accidentally introduce safety issues, or control MPTCP via userspace tools, which suffer from restricted functionality support. To address this issue, we propose eMPTCP, an easy-to-use framework to fully extend MPTCP without safety risks. Internally, eMPTCP has a modular and pluggable model which allows operators to specify a comprehensive MPTCP extension as a chain of sub-policies. eMPTCP further enforces the policies through packet header manipulations. To ensure safety, eMPTCP is implemented using eBPF. Despite the stringent constraints of eBPF, we show that it is possible to implement an elaborated framework for a fully extensible MPTCP. Through verifying MPTCP in a number of real-world cases and extensive experiments, we show that eMPTCP is able to support a wide range of MPTCP extensions, while the overhead of eMPTCP operations in the kernel is in the scale of nanosecond, and the extra processing time accounts for only about 0.63% of flows’ transmission time.","PeriodicalId":13443,"journal":{"name":"IEEE/ACM Transactions on Networking","volume":"32 6","pages":"5459-5474"},"PeriodicalIF":3.0,"publicationDate":"2024-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142858963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed Stable Multi-Source Dynamic Broadcasting for Wireless Multi-Hop Networks Under SINR-Based Adversarial Channel Jamming 基于sinr的无线多跳网络对抗信道干扰下的分布式稳定多源动态广播
IF 3 3区 计算机科学
IEEE/ACM Transactions on Networking Pub Date : 2024-10-07 DOI: 10.1109/TNET.2024.3470649
Xiang Tian;Baoxian Zhang;Cheng Li;Jiguo Yu
{"title":"Distributed Stable Multi-Source Dynamic Broadcasting for Wireless Multi-Hop Networks Under SINR-Based Adversarial Channel Jamming","authors":"Xiang Tian;Baoxian Zhang;Cheng Li;Jiguo Yu","doi":"10.1109/TNET.2024.3470649","DOIUrl":"https://doi.org/10.1109/TNET.2024.3470649","url":null,"abstract":"Disseminating continuous packet flows injected at multiple location-random source nodes to all network nodes, known as the multi-source dynamic global broadcast problem, is a fundamental building block for wireless multi-hop networks to run smoothly and efficiently. Previous studies on dynamic global broadcast all assume reliable communications. However, in realistic wireless networks, there exist unpredictable transmission failures caused by the randomized signal interference from uncorrelated wireless networks sharing the same spectrum or even malicious attackers. In this paper, by integrating the Signal-to-Interference-plus-Noise-Ratio (SINR) model, multi-channel communication mode, and randomized malicious channel jamming controlled by an adaptive adversary, we present an SINR-based adversarial channel jamming model to capture the unpredictable transmission failures in a wireless multi-hop network. We first propose a distributed Jamming-resilient Multi-source Static Broadcast (JMSB) algorithm based on random channel selection and message transmissions for multi-hop wireless networks under the above SINR-based adversarial channel jamming model. We then propose a distributed stable Jamming-resilient Multi-source Dynamic Broadcast (JMDB) algorithm which iterates JMSB repeatedly and efficiently in a two-stage manner. We derive the maximum supportable broadcast throughput of JMDB under the stability guarantee, i.e., the expected boundedness on the queue length of each network node and expected broadcast latency for each injected packet. Simulation results shows the stability and throughput efficiency of our proposed JMDB algorithm.","PeriodicalId":13443,"journal":{"name":"IEEE/ACM Transactions on Networking","volume":"32 6","pages":"5356-5371"},"PeriodicalIF":3.0,"publicationDate":"2024-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142859325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Scout Sketch+: Finding Both Promising and Damping Items Simultaneously in Data Streams 侦察兵草图+:在数据流中同时发现有希望和抑制的项目
IF 3 3区 计算机科学
IEEE/ACM Transactions on Networking Pub Date : 2024-10-04 DOI: 10.1109/TNET.2024.3469196
Guoju Gao;Tianyu Ma;He Huang;Yu-E Sun;Haibo Wang;Yang Du;Shigang Chen
{"title":"Scout Sketch+: Finding Both Promising and Damping Items Simultaneously in Data Streams","authors":"Guoju Gao;Tianyu Ma;He Huang;Yu-E Sun;Haibo Wang;Yang Du;Shigang Chen","doi":"10.1109/TNET.2024.3469196","DOIUrl":"https://doi.org/10.1109/TNET.2024.3469196","url":null,"abstract":"Data stream processing holds great potential value in lots of practical application scenarios. This paper studies two new but important patterns for items in data streams, called promising and damping items. The promising items mean that the frequencies of an item in multiple continuous time windows show an upward trend overall, while a slight decrease in some of these windows is allowed. In contrast to promising items exhibiting an increasing trend, the definition of damping items indicates a decreasing trend. Many applications can benefit from the property of promising or damping items, e.g., monitoring latent attacks in computer networks, pre-adjusting bandwidth allocation in communication channels, detecting potential hot events/news, or finding topics that gradually lose momentum in social networks. We first introduce how to accurately find promising items in data streams in real-time under limited memory space. To this end, we propose a novel structure named Scout Sketch, which consists of Filter and Finder. Filter is devised based on the Bloom filter to eliminate the ungratified items with less memory overload; Finder records some necessary information about the potential items and detects the promising items at the end of each time window, where we propose some tailor-made detection operations. We then enhance Scout Sketch (called Scout Sketch+) to adaptively detect both types of promising and damping items simultaneously. Finally, we conducted extensive experiments on four real-world datasets, which show that the F1 Score and throughput of Scout Sketch(+) are about 2.02 and 5.61 times that of the compared solutions. All source codes are available at Github (\u0000<uri>https://github.com/Aoohhh/ScoutSketch</uri>\u0000).","PeriodicalId":13443,"journal":{"name":"IEEE/ACM Transactions on Networking","volume":"32 6","pages":"5491-5506"},"PeriodicalIF":3.0,"publicationDate":"2024-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142858960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LFVeri: Network Configuration Verification for Virtual Private Cloud Networks LFVeri:虚拟私有云网络配置验证
IF 3 3区 计算机科学
IEEE/ACM Transactions on Networking Pub Date : 2024-10-03 DOI: 10.1109/TNET.2024.3469386
Kun Wang;Chengcheng Zhao;Jinpei Chu;Yiping Shi;Jianyuan Lu;Biao Lyu;Shunmin Zhu;Peng Cheng;Jiming Chen
{"title":"LFVeri: Network Configuration Verification for Virtual Private Cloud Networks","authors":"Kun Wang;Chengcheng Zhao;Jinpei Chu;Yiping Shi;Jianyuan Lu;Biao Lyu;Shunmin Zhu;Peng Cheng;Jiming Chen","doi":"10.1109/TNET.2024.3469386","DOIUrl":"https://doi.org/10.1109/TNET.2024.3469386","url":null,"abstract":"The Virtual Private Cloud (VPC) service enables users to configure shared resources within public clouds on demand, providing isolation between users. However, configuring the VPC network is a complex and error-prone task, and misconfiguration has been the leading cause of cloud network security issues. The large number of complex network components and configurations makes it difficult to perform scalable, efficient, and accurate fault verification of the network behavior. To address this issue, we design a comprehensive and automated fault diagnosis and localization tool, called \u0000<monospace>LFVeri</monospace>\u0000, which is built upon an innovative modular network model that accurately captures the logic functions of real components within VPC networks, and propose eleven functions to verify network reachability and security requirements. We conduct performance testing of \u0000<monospace>LFVeri</monospace>\u0000 on various datasets and compared it with other verification tools. The experiments show that \u0000<monospace>LFVeri</monospace>\u0000 outperforms in modeling and analyzing real VPC scenarios while also possessing the fastest verification speed. It can model and analyze large VPC networks with tens of thousands of components and millions of configuration rules in less than half an hour.","PeriodicalId":13443,"journal":{"name":"IEEE/ACM Transactions on Networking","volume":"32 6","pages":"5475-5490"},"PeriodicalIF":3.0,"publicationDate":"2024-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142858962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Social-Aware Clustered Federated Learning With Customized Privacy Preservation 具有定制隐私保护功能的社交感知聚类联合学习
IF 3 3区 计算机科学
IEEE/ACM Transactions on Networking Pub Date : 2024-10-02 DOI: 10.1109/TNET.2024.3379439
Yuntao Wang;Zhou Su;Yanghe Pan;Tom H. Luan;Ruidong Li;Shui Yu
{"title":"Social-Aware Clustered Federated Learning With Customized Privacy Preservation","authors":"Yuntao Wang;Zhou Su;Yanghe Pan;Tom H. Luan;Ruidong Li;Shui Yu","doi":"10.1109/TNET.2024.3379439","DOIUrl":"https://doi.org/10.1109/TNET.2024.3379439","url":null,"abstract":"A key feature of federated learning (FL) is to preserve the data privacy of end users. However, there still exist potential privacy leakage in exchanging gradients under FL. As a result, recent research often explores the differential privacy (DP) approaches to add noises to the computing results to address privacy concerns with low overheads, which however degrade the model performance. In this paper, we strike the balance of data privacy and efficiency by utilizing the pervasive social connections between users. Specifically, we propose SCFL, a novel Social-aware Clustered Federated Learning scheme, where mutually trusted individuals can freely form a social cluster and aggregate their raw model updates (e.g., gradients) inside each cluster before uploading to the cloud for global aggregation. By mixing model updates in a social group, adversaries can only eavesdrop the social-layer combined results, but not the privacy of individuals. As such, SCFL considerably enhances model utility without sacrificing privacy in a low-cost and highly feasible manner. We unfold the design of SCFL in three steps. i) Stable social cluster formation. Considering users’ heterogeneous training samples and data distributions, we formulate the optimal social cluster formation problem as a federation game and devise a fair revenue allocation mechanism to resist free-riders. ii) Differentiated trust-privacy mapping. For the clusters with low mutual trust, we design a customizable privacy preservation mechanism to adaptively sanitize participants’ model updates depending on social trust degrees. iii) Distributed convergence. A distributed two-sided matching algorithm is devised to attain an optimized disjoint partition with Nash-stable convergence. Experiments on Facebook network and MNIST/CIFAR-10 datasets validate that our SCFL can effectively enhance learning utility, improve user payoff, and enforce customizable privacy protection.","PeriodicalId":13443,"journal":{"name":"IEEE/ACM Transactions on Networking","volume":"32 5","pages":"3654-3668"},"PeriodicalIF":3.0,"publicationDate":"2024-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142447182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Combining Capacity and Length: Finding Connectivity Bottleneck in a Layered Network 结合容量和长度:寻找分层网络中的连接瓶颈
IF 3 3区 计算机科学
IEEE/ACM Transactions on Networking Pub Date : 2024-10-01 DOI: 10.1109/TNET.2024.3466522
Peng Zhang
{"title":"Combining Capacity and Length: Finding Connectivity Bottleneck in a Layered Network","authors":"Peng Zhang","doi":"10.1109/TNET.2024.3466522","DOIUrl":"https://doi.org/10.1109/TNET.2024.3466522","url":null,"abstract":"Computer networks are often multi-layered. For simplicity, let us focus on two-layered networks with logical layer and physical layer. Such a network can be modeled as a labeled graph \u0000<inline-formula> <tex-math>$G = (V, E)$ </tex-math></inline-formula>\u0000 with a label set \u0000<inline-formula> <tex-math>$L = {ell _{1}, ell _{2}, {dots }, ell _{q} }$ </tex-math></inline-formula>\u0000, in which each edge (denotes logical connection) \u0000<inline-formula> <tex-math>$e in E$ </tex-math></inline-formula>\u0000 has a label (denotes physical link) \u0000<inline-formula> <tex-math>$ell (e)$ </tex-math></inline-formula>\u0000 from L. The key issue is that different edges may have the same label. In the weighted minimum Label s-t Cut problem, we are given a labeled graph \u0000<inline-formula> <tex-math>$G=(V,E)$ </tex-math></inline-formula>\u0000 with label set L, where each label \u0000<inline-formula> <tex-math>$ell $ </tex-math></inline-formula>\u0000 has a nonnegative weight \u0000<inline-formula> <tex-math>$w_{ell } $ </tex-math></inline-formula>\u0000, a source \u0000<inline-formula> <tex-math>$s in V$ </tex-math></inline-formula>\u0000 and a sink \u0000<inline-formula> <tex-math>$t in V$ </tex-math></inline-formula>\u0000. The problem asks to find a minimum weight label subset \u0000<inline-formula> <tex-math>$L'$ </tex-math></inline-formula>\u0000 (called a label s-t cut) such that the removal of all edges with labels in \u0000<inline-formula> <tex-math>$L'$ </tex-math></inline-formula>\u0000 disconnects s and t. Label s-t cut depicts the connectivity bottleneck of a layered network. It is a natural generalization of the edge connectivity of a graph. In this paper, we provide an approximation algorithm for the weighted Label s-t Cut problem with ratio \u0000<inline-formula> <tex-math>$O(n^{2/3})$ </tex-math></inline-formula>\u0000, where n is the number of vertices. This is the first approximation algorithm for the problem whose ratio is given in terms of n. The key point of the algorithm is a mechanism to interpret label weight on an edge as both its length (as in the Shortest s-t Path problem) and capacity (as in the Min s-t Cut problem). Experiments on random graphs show that the algorithm has also good practical performance.","PeriodicalId":13443,"journal":{"name":"IEEE/ACM Transactions on Networking","volume":"32 6","pages":"5430-5439"},"PeriodicalIF":3.0,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142859216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
QUIRL: Flexible QUIC Loss Recovery for Low Latency Applications 为低延迟应用提供灵活的QUIC损耗恢复
IF 3 3区 计算机科学
IEEE/ACM Transactions on Networking Pub Date : 2024-10-01 DOI: 10.1109/TNET.2024.3453759
François Michel;Olivier Bonaventure
{"title":"QUIRL: Flexible QUIC Loss Recovery for Low Latency Applications","authors":"François Michel;Olivier Bonaventure","doi":"10.1109/TNET.2024.3453759","DOIUrl":"https://doi.org/10.1109/TNET.2024.3453759","url":null,"abstract":"A growing number of Internet applications require low latency. Unfortunately, most of these applications cannot use the rich features of the QUIC protocol since it only uses retransmissions to cope with packet losses. We propose, implement and evaluate QUIRL, a revisit of the QUIC loss recovery mechanism. QUIRL relies on Forward Erasure Correction (FEC) only if it is needed by the application’s latency requirements and uses classical retransmissions otherwise. We implement QUIRL and evaluate its performance for real-time video and HTTP/3. Compared to previous works adding FEC to QUIC, QUIRL is the first to be evaluated with and obtain significant performance improvements for popular applications over real lossy networks. Our evaluation shows that for video QUIRL improves the video quality while meeting strict delay requirements. For HTTP/3 transfers, QUIRL efficiently reduces the tail latency when packet losses occur without causing harm when there are no losses. We confirm these results using emulation over a wide ranges of bandwidth, delays and loss scenarios. We release our QUIRL implementation to encourage other researchers and industry to explore in more details the use of FEC in QUIC.","PeriodicalId":13443,"journal":{"name":"IEEE/ACM Transactions on Networking","volume":"32 6","pages":"5204-5215"},"PeriodicalIF":3.0,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142859202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信